{"_id":{"_str":"535ed25b97e559e821000503"},"__v":1,"authorIDs":[],"author_short":["Byers","R, S."],"bibbaseid":"byers-r-realtimefusionandprojectionofnetworkintrusionactivity","bibdata":{"downloads":0,"bibbaseid":"byers-r-realtimefusionandprojectionofnetworkintrusionactivity","urls":{},"role":"author","type":"article","title":"Real-time Fusion and Projection of Network Intrusion Activity","pages":"2--9","key":"Byers","journal":"Information Fusion","id":"Byers","bibtype":"article","bibtex":"@article{ Byers,\n author = {Byers, Stephen R},\n journal = {Information Fusion},\n pages = {2--9},\n title = {{Real-time Fusion and Projection of Network Intrusion Activity}}\n}","author_short":["Byers","R, S."],"author":["Byers","R, Stephen"]},"bibtype":"article","biburl":"https://dl.dropboxusercontent.com/u/14215034/bibs/bibs/A-List-bb.bib","downloads":0,"keywords":[],"search_terms":["real","time","fusion","projection","network","intrusion","activity","byers","r"],"title":"Real-time Fusion and Projection of Network Intrusion Activity","year":null,"dataSources":["jGrSs2aYARmRcupKy"]}